Tech-invite3GPPspaceIETFspace
21222324252627282931323334353637384‑5x
Top   in Index   Prev   Next

TR 33.741
Study on Home Network triggered Primary Authentication

3GPP‑Page  
V18.0.1 (Wzip)  2023/03  38 p.
Rapporteur:
Mr. Li, He
HUAWEI TECHNOLOGIES Co. Ltd.

full Table of Contents for  TR 33.741  Word version:  18.0.1

Here   Top

 

1  Scopep. 7

The present document studies the use cases which needs Home Network initiated primary authentication and the associated security threats and requirements. As part of this investigation, the study aims at identifying which network function in the HN is better suitable to trigger the primary authentication, corresponding procedures, the potential impacts on visited and home network, and the potential impacts on existing procedures. Moreover, solutions for potential normative work are also in the scope of this study.
Up

2  Referencesp. 7

3  Definitions of terms, symbols and abbreviationsp. 7

3.1  Termsp. 7

3.2  Symbolsp. 7

3.3  Abbreviationsp. 7

4  Key issuesp. 8

5  Potential solutionsp. 9

5.0  Mapping of solutions to key issuesp. 9

5.1  Solution #1: HN triggering primary authentication for various scenariosp. 9

5.2  Solution #2: UDM triggered primary authenticationp. 12

5.3  Solution #3: Home network triggered authentication solution for LTE to 5G interworkingp. 14

5.4  Solution #4: UDM initiated primary authentication based on a NF requestp. 15

5.5  Solution #5: Using the UDM to start home triggered authenticationsp. 16

5.6  Solution #6: UDM initiated primary authentication based on AUSF requestp. 18

5.7  Solution #7: UDM initiated Primary Authenticationp. 19

5.8  Solution #8: Solution to enable UDM in the HN to trigger Primary Authenticationp. 21

5.9  Solution #9: AMF initiated primary authentication based on AUSF requestp. 25

5.10  Solution #10: UDM initiated primary authentication based on AAnF request for KAF refresh scenariop. 28

5.11  Solution #11: Home network triggered primary authentication controlled by the UDMp. 30

5.12  Solution #12: Delegated Home Network controlled primary authenticationp. 35

6  Conclusionsp. 36

A  Use casesp. 37

$  Change historyp. 38


Up   Top